CN104333547A - Safety protection method of two-way interaction intelligent ammeter - Google Patents

Safety protection method of two-way interaction intelligent ammeter Download PDF

Info

Publication number
CN104333547A
CN104333547A CN201410578770.4A CN201410578770A CN104333547A CN 104333547 A CN104333547 A CN 104333547A CN 201410578770 A CN201410578770 A CN 201410578770A CN 104333547 A CN104333547 A CN 104333547A
Authority
CN
China
Prior art keywords
electric energy
energy meter
intelligent electric
copy reading
reading equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410578770.4A
Other languages
Chinese (zh)
Other versions
CN104333547B (en
Inventor
梁晓兵
曹永峰
赵兵
刘鹰
翟峰
吕英杰
付义伦
李保丰
孙志强
岑炜
徐文静
许斌
卢艳
袁泉
冯占成
张庚
任博
杨全萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Original Assignee
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, China Electric Power Research Institute Co Ltd CEPRI filed Critical State Grid Corp of China SGCC
Priority to CN201410578770.4A priority Critical patent/CN104333547B/en
Publication of CN104333547A publication Critical patent/CN104333547A/en
Application granted granted Critical
Publication of CN104333547B publication Critical patent/CN104333547B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Selective Calling Equipment (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)
  • Small-Scale Networks (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a safety protection method of a two-way interaction intelligent ammeter. The device used in the method comprises an intelligent ammeter and a communication module; the intelligent ammeter respectively communicates with a local reading device and a user information acquiring system through two network interfaces of the communication module. The method is characterized in that the modes of identity authentication, access control, priority control, protocol filtering and data encrypting protection are carried out to realize the safety protection of communication between the intelligent ammeter and the local reading device and the communication between the intelligent ammeter and the user information acquiring system. With the adoption of the method, the safety of communication of the two-way interaction intelligent ammeter is ensured, the communication between the ammeter and the local reading device is realized, and the performance of the existing power consumption information acquiring system is not influenced.

Description

A kind of method for security protection of two-way interaction intelligent electric energy meter
Technical field
The present invention relates to a kind of guard method of electric energy meter, specifically relate to a kind of method for security protection of two-way interaction intelligent electric energy meter.
Background technology
For promoting the interactive level of strong intelligent grid further, omnidirectional support electrical network is intelligent, interactive realization of goal, positive carrying and the promotion third time industrial revolution, strengthen participation and the perceptibility of Electricity customers, the world promoting smart grid electricity usage link leads status, have developed direct two-way interactive intelligent electric energy meter.
Two-way interaction intelligent electric energy meter can support that the data of localized copy reading equipment to electric energy meter inside read.The networking of localization equipment may cause the information leakage of power consumer on the one hand, can bring adverse influence on the other hand to current existing network
Summary of the invention
For the deficiencies in the prior art; the object of this invention is to provide a kind of method for security protection of two-way interaction intelligent electric energy meter; the present invention passes through identity verify; access control; two priority classes, protocol filtering, the protection mechanisms such as data encryption ensure that the communication security of two-way interaction intelligent electric energy meter; both achieved the secure communication between electric energy meter and localized copy reading equipment, can not impact the performance of existing power information acquisition system again.
The object of the invention is to adopt following technical proposals to realize:
The invention provides a kind of method for security protection of two-way interaction intelligent electric energy meter, its improvements are, the device of described method comprises intelligent electric energy meter and communication module; Described intelligent electric energy meter is communicated with user profile acquisition system with localized copy reading equipment respectively by two network interfaces of communication module;
Described method realizes the safeguard protection communicated between intelligent electric energy meter and localized copy reading equipment and between intelligent electric energy meter and user profile acquisition system by identity verify, access control, two priority classes, protocol filtering and protecting data encryption mode.
Further, described data encryption ensures the confidentiality of data; Identity verify comprises localized copy reading equipment to the authentication of intelligent electric energy meter and intelligent electric energy meter to the authentication of localized copy reading equipment; Two priority classes specifies that the Request Priority of user profile acquisition system is higher than localized copy reading equipment, and the localized copy reading priority facility in white list list excludes the equipment of white list list higher than address; Access control refers to and is stored in white list by the ID of trusted device, to realize the mandate to equipment;
Wherein identity verify and data encryption are realized by ESAM safety chip embedded in localized copy reading equipment and communication module; Access control is realized by the white list list of communication module application layer; Two priority classes and protocol filtering are realized by communication module application layer service logic.
Further, identity verify adopts the bidirectional identity authentication mode based on the inside and outside certification of symmetric key, comprises following sub-step:
(1) localized copy reading equipment sends connection request and random number R 1 to intelligent electric energy meter;
(2) by intelligent electric energy meter, random number R 1 is encrypted, produces random number R 2 simultaneously, random number R 1 ciphertext and random number R 2 are sent to localized copy reading equipment;
(3) localized copy reading device decrypts comparison random number R 1, if the R1 random number R 1 produced in step (1) is consistent with the plaintext obtained after the decrypt ciphertext received, then complete localized copy reading equipment to the authentication of intelligent electric energy meter, encrypted random number R2, and random number R 2 ciphertext is sent to intelligent electric energy meter;
(4) intelligent electric energy meter deciphering comparison random number R 2, if both are consistent, then completes the authentication of intelligent electric energy meter to localized copy reading equipment, and feeds back authentication result to localized copy reading equipment;
Step (1)-(4) complete a hyperlink request flow for authenticating ID, and the localized copy reading equipment that authentication is passed through carries out the copy reading of intelligent electric energy meter data message; Random number R 3 in the message that random number R 2 and random number R 3 are formed is for the encryption process of follow-up data, and random number R 3, as the initial vector of follow-up data encryption process, effectively prevents Replay Attack.
Further, described access control, according to the white list list in communication module, to the localized copy reading operate restriction of different rights, guarantees only have the address in white list list and communication module of intelligent electric energy meter to carry out alternately; Credible address is set to the white list list in communication module by the localized copy reading equipment possessing administrator right, and the localized copy reading equipment of normal user permission only can carry out the copy reading of data; The localized copy reading equipment of administrator right, by Utilities Electric Co.'s unified management, uses when carrying out communication module and subscriber household localization copy reading equipment initially installs.
Further, intelligent electric energy meter is controlled by interrupt priority level, distinguishes the data request command that power information acquisition system and localized copy reading equipment issue, the request of data that preferential answering user profile acquisition system issues;
Intelligent electric energy meter is according to the importance and the pressing degree that cause interrupt event, user profile acquisition system is sent instruction and is set to high priority, the data request command that localization copy reading equipment issues is set to second priority level, and untrusted address sends instruction and is set to low priority; When interrupt occurs simultaneously, the CPU in communication module is according to ordinal response from high to low; High-priority interrupt can interrupt the operation of low level interrupts handling procedure, then performs high level interrupt process.
Further, DL/T645 communication protocol is taked in the communication between described localized copy reading equipment and intelligent electric energy meter;
The protocol filtering machine communication protocol according to a preconcerted arrangement of communication module, communication frequency and the communication message length communication port data to intelligent electric energy meter localization copy reading equipment are filtered, mask the data message not meeting protocol rule, permission business is carried out intelligent electric energy meter data reading system protocol massages that is limited, length-specific in process (current electric energy indicating value, freeze forward day to gain merit total electric energy, instantaneous voltage, instantaneous power and remaining sum etc.) and is passed through, and does not allow to carry out write operation to intelligent electric energy meter.
Further, when localized copy reading equipment initiates intelligent electric energy meter data reading system instruction, communication module is encrypted the communication data in copy reading instruction by the ESAM safety chip of its inside, form the DL/T645 communication message with cipher-text information, via traffic channel in communication module;
Communication module is resolved ciphertext instruction by ESAM safety chip, is reduced into clear data and is transmitted to intelligent electric energy meter by the serial ports of communication module;
Communication module is encrypted communication data information by ESAM safety chip, forms the DL/T645 communication message with cipher-text information, be transmitted to localized copy reading equipment after receiving the response message of intelligent electric energy meter feedback.
Compared with the prior art, the beneficial effect that the present invention reaches is:
1. the present invention can support the function of localized copy reading equipment comprehensively;
2. the present invention can ensure the confidentiality of interaction data, completeness and efficiency; The present invention passes through identity verify, access control, two priority classes, protocol filtering, and the protection mechanisms such as data encryption ensure that the communication security of two-way interaction intelligent electric energy meter; Be ensure that the confidentiality of the communication information by encryption technology, prevent the leakage of user profile;
3. the present invention can compatible localized copy reading equipment and power information acquisition system, and ensures power information acquisition system by the impact of localized copy reading equipment.
Accompanying drawing explanation
Fig. 1 is method for security protection frame diagram provided by the invention;
Fig. 2 is identity verify process schematic provided by the invention;
Fig. 3 is access control process schematic provided by the invention;
Fig. 4 is two priority classes process schematic provided by the invention;
Fig. 5 is protocol filtering process schematic provided by the invention;
Fig. 6 is data encryption process schematic diagram provided by the invention.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in further detail.
The method for security protection of two-way interaction intelligent electric energy meter carries out safety and Protection to communication module of intelligent electric energy meter and localized copy reading devices communicating passage; adopt the modes such as identity verify, access control, two priority classes, protocol filtering and protecting data encryption, realize the security protection of intelligent electric energy meter localized communications.Wherein the identity verify of communication module of intelligent electric energy meter, protecting data encryption function realize by the mode of embedded ESAM safety chip; Access control function is realized by the white list list of communication module application layer; Two priority classes, protocol filtering are realized by communication module application layer service logic.
Fig. 1 is the frame diagram of two-way interaction intelligent electric energy meter safety approach, and method for security protection comprises data encryption, identity verify, two priority classes and access control.Data encryption can ensure the confidentiality of data; Identity verify comprises localized copy reading equipment to the authentication of electric energy meter and electric energy meter to the authentication of localized copy reading equipment; Two priority classes defines the Request Priority of acquisition system higher than localized copy reading equipment, and the localized priority facility in white list excludes the equipment of white list higher than address; Access control refers to and is stored in white list by the ID of trusted device, to realize the mandate to equipment.
Fig. 2 is identity verify process flow diagram, and identity verify adopts the bidirectional identity authentication flow process based on the inside and outside certification of symmetric key, comprising:
(1) localized copy reading equipment sends connection request and random number R 1 to intelligent electric energy meter;
(2) by intelligent electric energy meter, R1 is encrypted, produces random number R 2 simultaneously, R1 ciphertext and R2 are sent to localized copy reading equipment;
(3) localized copy reading device decrypts comparison R1, if both are consistent, then completes localized copy reading equipment to the authentication of intelligent electric energy meter, encryption R2, and R2 ciphertext is sent to intelligent electric energy meter;
(4) intelligent electric energy meter deciphering comparison R2, if both are consistent, then completes the authentication of intelligent electric energy meter to localized copy reading equipment, and feeds back authentication result to localized copy reading equipment.
So far, complete a hyperlink request flow for authenticating ID, the localized copy reading equipment that certification is passed through can carry out the copy reading of intelligent electric energy meter data message.Random number R 3 in message 3 (message that random number R 2 and random number R 3 are formed) is for the encryption process of follow-up data, and random number R 3, as the initial vector of follow-up data encryption process, effectively can prevent Replay Attack.
Fig. 3 is the implementation of access control mechanisms, access control is according to the white list list in communication module of intelligent electric energy meter, to the localized copy reading operate restriction of different rights, guarantee only have the address party in white list list can carry out alternately with communication module of intelligent electric energy meter.Achieve the binding authentication of address, message source, improve the fail safe of communication interaction.Credible address can be set to the white list list in communication module of intelligent electric energy meter by the localized copy reading equipment possessing administrator right, and the localized copy reading equipment of normal user permission only can carry out the copy reading of data.The localized copy reading equipment of administrator right is by Utilities Electric Co.'s unified management, and carrying out communication module, subscriber household localization copy reading equipment uses when initially installing.
Fig. 4 is the implementation schematic diagram of two priority classes, and intelligent electric energy meter by interrupt priority level controlling mechanism, distinguishes the data request command that power information acquisition terminal equipment and localized copy reading equipment issue, the request of data that preferential answering acquisition terminal issues.According to the importance and the pressing degree that cause interrupt event, acquisition terminal equipment is sent instruction and is set to high priority by hardware, and the data request command that localized copy reading equipment issues is set to second priority level, and untrusted address sends instruction and is set to low priority.When interrupt occurs simultaneously, CPU is according to ordinal response from high to low.High-priority interrupt can interrupt the operation of low level interrupts handling procedure, then performs high level interrupt handling procedure.Adopt and can effectively prevent network congestion sexual assault based on the control of CPU interrupt priority level and interruption masking function, ensure that the communication network of acquisition system and intelligent electric energy meter is unimpeded.
Fig. 5 protocol filtering process schematic, intelligent electric energy meter only supports DL/T645 communication protocol, and the communication therefore between localized copy reading equipment and intelligent electric energy meter must take DL/T645 communication protocol to realize.Communication module of intelligent electric energy meter inside increases protocol filtering mechanism, communication protocol according to a preconcerted arrangement, communication frequency, communication message length etc. are filtered intelligent electric energy meter localization copy reading communication port data, mask the data message not meeting protocol rule, business is only allowed to carry out in process limited, several intelligent electric energy meter data reading system protocol massages (current electric energy indicating values of length-specific, day freeze forward to gain merit total electric energy, instantaneous voltage, instantaneous power, remaining sum etc.) pass through, do not allow to carry out write operation to intelligent electric energy meter, to resist potential external attack.
Fig. 6 data encryption process schematic diagram, utilizes ESAM safety chip embedded in communication module of intelligent electric energy meter and local copy reading equipment, realizes the encryption and decryption transmitting data between intelligent electric energy meter and localized copy reading equipment, guarantees the fail safe of transfer of data.When localization copy reading equipment carries out installation and deployment, the pairing utilizing special localized copy reading debugging acid to complete between communication module of intelligent electric energy meter ESAM chip keys and subscriber household inside local copy reading equipment ESAM chip keys by Utilities Electric Co. site installation test personnel manages.When localized copy reading equipment initiates intelligent electric energy meter data reading system instruction, communication module of intelligent electric energy meter is encrypted the critical data content in copy reading instruction by the ESAM safety chip of its inside, form the DL/T645 communication message with cipher-text information, via traffic channel to communication module of intelligent electric energy meter.Communication module of intelligent electric energy meter is resolved ciphertext instruction by ESAM safety chip, is reduced into clear data and is transmitted to intelligent electric energy meter by serial ports.Communication module of intelligent electric energy meter is encrypted critical data information by ESAM safety chip, forms the DL/T645 communication message with cipher-text information, be transmitted to localized copy reading equipment after receiving the response message of intelligent electric energy meter feedback.All use ESAM safety chip to carry out the encryption and decryption of critical data information in whole transmitting procedure, guarantee the safe and reliable of transfer of data, avoid the risk of information leakage and data tampering.
The method for security protection of two-way interaction intelligent electric energy meter provided by the invention, can not cause the information leakage of power consumer, also can not bring adverse influence to current existing network, ensure that the communication security of two-way interaction intelligent electric energy meter.
Finally should be noted that: above embodiment is only in order to illustrate that technical scheme of the present invention is not intended to limit; although with reference to above-described embodiment to invention has been detailed description; those of ordinary skill in the field still can modify to the specific embodiment of the present invention or equivalent replacement; these do not depart from any amendment of spirit and scope of the invention or equivalent replacement, are all applying within the claims of the present invention awaited the reply.

Claims (7)

1. a method for security protection for two-way interaction intelligent electric energy meter, is characterized in that, the device of described method comprises intelligent electric energy meter and communication module; Described intelligent electric energy meter is communicated with user profile acquisition system with localized copy reading equipment respectively by two network interfaces of communication module;
Described method realizes the safeguard protection communicated between intelligent electric energy meter and localized copy reading equipment and between intelligent electric energy meter and user profile acquisition system by identity verify, access control, two priority classes, protocol filtering and protecting data encryption mode.
2. method for security protection as claimed in claim 1, is characterized in that, described data encryption ensures the confidentiality of data; Identity verify comprises localized copy reading equipment to the authentication of intelligent electric energy meter and intelligent electric energy meter to the authentication of localized copy reading equipment; Two priority classes specifies that the Request Priority of user profile acquisition system is higher than localized copy reading equipment, and the localized copy reading priority facility in white list list excludes the equipment of white list list higher than address; Access control refers to and is stored in white list by the ID of trusted device, to realize the mandate to equipment;
Wherein identity verify and data encryption are realized by ESAM safety chip embedded in localized copy reading equipment and communication module; Access control is realized by the white list list of communication module application layer; Two priority classes and protocol filtering are realized by communication module application layer service logic.
3. method for security protection as claimed in claim 1, is characterized in that, identity verify adopts the bidirectional identity authentication mode based on the inside and outside certification of symmetric key, comprises following sub-step:
(1) localized copy reading equipment sends connection request and random number R 1 to intelligent electric energy meter;
(2) by intelligent electric energy meter, random number R 1 is encrypted, produces random number R 2 simultaneously, random number R 1 ciphertext and random number R 2 are sent to localized copy reading equipment;
(3) localized copy reading device decrypts comparison random number R 1, if the R1 random number R 1 produced in step (1) is consistent with the plaintext obtained after the decrypt ciphertext received, then complete localized copy reading equipment to the authentication of intelligent electric energy meter, encrypted random number R2, and random number R 2 ciphertext is sent to intelligent electric energy meter;
(4) intelligent electric energy meter deciphering comparison random number R 2, if both are consistent, then completes the authentication of intelligent electric energy meter to localized copy reading equipment, and feeds back authentication result to localized copy reading equipment;
Step (1)-(4) complete a hyperlink request flow for authenticating ID, and the localized copy reading equipment that authentication is passed through carries out the copy reading of intelligent electric energy meter data message; Random number R 3 in the message that random number R 2 and random number R 3 are formed is for the encryption process of follow-up data, and random number R 3, as the initial vector of follow-up data encryption process, effectively prevents Replay Attack.
4. method for security protection as claimed in claim 1, it is characterized in that, described access control, according to the white list list in communication module, to the localized copy reading operate restriction of different rights, guarantees only have the address in white list list and communication module of intelligent electric energy meter to carry out alternately; Credible address is set to the white list list in communication module by the localized copy reading equipment possessing administrator right, and the localized copy reading equipment of normal user permission only can carry out the copy reading of data; The localized copy reading equipment of administrator right, by Utilities Electric Co.'s unified management, uses when carrying out communication module and subscriber household localization copy reading equipment initially installs.
5. method for security protection as claimed in claim 1, it is characterized in that, intelligent electric energy meter is controlled by interrupt priority level, distinguishes the data request command that power information acquisition system and localized copy reading equipment issue, the request of data that preferential answering user profile acquisition system issues;
Intelligent electric energy meter is according to the importance and the pressing degree that cause interrupt event, user profile acquisition system is sent instruction and is set to high priority, the data request command that localization copy reading equipment issues is set to second priority level, and untrusted address sends instruction and is set to low priority; When interrupt occurs simultaneously, the CPU in communication module is according to ordinal response from high to low; High-priority interrupt can interrupt the operation of low level interrupts handling procedure, then performs high level interrupt process.
6. method for security protection as claimed in claim 1, it is characterized in that, DL/T645 communication protocol is taked in the communication between described localized copy reading equipment and intelligent electric energy meter;
The protocol filtering machine communication protocol according to a preconcerted arrangement of communication module, communication frequency and the communication message length communication port data to intelligent electric energy meter localization copy reading equipment are filtered, mask the data message not meeting protocol rule, permission business is carried out intelligent electric energy meter data reading system protocol massages that is limited, length-specific in process and is passed through, and does not allow to carry out write operation to intelligent electric energy meter.
7. method for security protection as claimed in claim 1, it is characterized in that, when localized copy reading equipment initiates intelligent electric energy meter data reading system instruction, communication module is encrypted the communication data in copy reading instruction by the ESAM safety chip of its inside, form the DL/T645 communication message with cipher-text information, via traffic channel in communication module;
Communication module is resolved ciphertext instruction by ESAM safety chip, is reduced into clear data and is transmitted to intelligent electric energy meter by the serial ports of communication module;
Communication module is encrypted communication data information by ESAM safety chip, forms the DL/T645 communication message with cipher-text information, be transmitted to localized copy reading equipment after receiving the response message of intelligent electric energy meter feedback.
CN201410578770.4A 2014-10-24 2014-10-24 A kind of method for security protection of two-way interaction intelligent electric energy meter Active CN104333547B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410578770.4A CN104333547B (en) 2014-10-24 2014-10-24 A kind of method for security protection of two-way interaction intelligent electric energy meter

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410578770.4A CN104333547B (en) 2014-10-24 2014-10-24 A kind of method for security protection of two-way interaction intelligent electric energy meter

Publications (2)

Publication Number Publication Date
CN104333547A true CN104333547A (en) 2015-02-04
CN104333547B CN104333547B (en) 2018-01-19

Family

ID=52408199

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410578770.4A Active CN104333547B (en) 2014-10-24 2014-10-24 A kind of method for security protection of two-way interaction intelligent electric energy meter

Country Status (1)

Country Link
CN (1) CN104333547B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577386A (en) * 2015-12-23 2016-05-11 中国电力科学研究院 Data encryption method of bilateral interaction intelligent electric energy meter
CN106340176A (en) * 2015-07-09 2017-01-18 中国电力科学研究院 Intelligent electricity meter information sharing method, intelligent electricity meter and acquisition router
CN109613467A (en) * 2018-10-30 2019-04-12 杭州海兴电力科技股份有限公司 For realizing the test equipment and test method of the multilist test at simulation scene
CN112367664A (en) * 2020-09-23 2021-02-12 国家电网有限公司 Method and device for safely accessing external equipment to intelligent electric meter
CN112750654A (en) * 2020-12-18 2021-05-04 北京智芯微电子科技有限公司 Circuit breaker

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201352234Y (en) * 2009-05-18 2009-11-25 深圳市森晖电子有限公司 Three-phase multifunctional electric energy meter
CN101917451A (en) * 2010-09-17 2010-12-15 威胜集团有限公司 Method of multi-purpose electric energy meter for communication by utilizing DL/T645 communication protocol
CN104063756A (en) * 2014-05-23 2014-09-24 国网辽宁省电力有限公司本溪供电公司 Electric power utilization information remote control system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201352234Y (en) * 2009-05-18 2009-11-25 深圳市森晖电子有限公司 Three-phase multifunctional electric energy meter
CN101917451A (en) * 2010-09-17 2010-12-15 威胜集团有限公司 Method of multi-purpose electric energy meter for communication by utilizing DL/T645 communication protocol
CN104063756A (en) * 2014-05-23 2014-09-24 国网辽宁省电力有限公司本溪供电公司 Electric power utilization information remote control system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106340176A (en) * 2015-07-09 2017-01-18 中国电力科学研究院 Intelligent electricity meter information sharing method, intelligent electricity meter and acquisition router
CN106340176B (en) * 2015-07-09 2020-01-17 中国电力科学研究院 Information sharing method of intelligent electric meter, intelligent electric meter and acquisition router
CN105577386A (en) * 2015-12-23 2016-05-11 中国电力科学研究院 Data encryption method of bilateral interaction intelligent electric energy meter
CN109613467A (en) * 2018-10-30 2019-04-12 杭州海兴电力科技股份有限公司 For realizing the test equipment and test method of the multilist test at simulation scene
CN112367664A (en) * 2020-09-23 2021-02-12 国家电网有限公司 Method and device for safely accessing external equipment to intelligent electric meter
CN112367664B (en) * 2020-09-23 2024-03-01 国家电网有限公司 Method and device for safely accessing external equipment into intelligent ammeter
CN112750654A (en) * 2020-12-18 2021-05-04 北京智芯微电子科技有限公司 Circuit breaker

Also Published As

Publication number Publication date
CN104333547B (en) 2018-01-19

Similar Documents

Publication Publication Date Title
CN106789015B (en) Intelligent power distribution network communication safety system
CN102111265B (en) Method for encrypting secure chip of power system acquisition terminal
CN202856452U (en) Power distribution network system
CN110753344B (en) NB-IoT-based smart meter secure access system
CN103679062A (en) Intelligent electric meter main control chip and security encryption method
CN104579679B (en) Wireless public network data forwarding method for agriculture distribution communication equipment
CN104333547A (en) Safety protection method of two-way interaction intelligent ammeter
CN102571702A (en) Key generation method, system and equipment in Internet of things
CN103888444A (en) Distribution safety authentication device and method
CN101877702A (en) Method and system for activating and authenticating an internet protocol television client
CN108173344A (en) LORA wireless communication techniques are in the application process of low-voltage distribution transformer platform district
CN103986582A (en) Data encryption transmission method, device and system based on dynamic encryption technology
CN106549502B (en) A kind of safe distribution of electric power protecting, monitoring system
CN105577386A (en) Data encryption method of bilateral interaction intelligent electric energy meter
CN103051450A (en) System and method applicable to electric power information collection system for distributing safety tasks
CN111435390A (en) Safety protection method for operation and maintenance tool of power distribution terminal
CN104637117A (en) Intelligent lock pin realization method, key realization method, intelligent lock pin, lock and key
CN205584238U (en) Network data encryption equipment
CN102255727B (en) Improved anti-attacking intelligent card authentication method based on user defined algorithm environment
US20210111909A1 (en) Fluid meter communicating with an electromechanical valve
BR112016007210B1 (en) METHOD AND DEVICE FOR COMMUNICATION SECURITY WITHIN AN ENDPOINT IN A NETWORK
CN205787791U (en) Network relay and network system
CN111435389A (en) Power distribution terminal operation and maintenance tool safety protection system
CN109857421A (en) The encryption upgrade method and system of embedded device
CN103473495A (en) Field service terminal permission management system and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant